Affiliation:
1. Carnegie Mellon University, Pittsburgh, PA
2. Google, Mountain View, CA
3. University of North Carolina at Chapel Hill, NC
Abstract
Access-control policy misconfigurations that cause requests to be erroneously denied can result in wasted time, user frustration, and, in the context of particular applications (e.g., health care), very severe consequences. In this article we apply association rule mining to the history of accesses to predict changes to access-control policies that are likely to be consistent with users' intentions, so that these changes can be instituted in advance of misconfigurations interfering with legitimate accesses. Instituting these changes requires the consent of the appropriate administrator, of course, and so a primary contribution of our work is how to automatically determine from whom to seek consent and how to minimize the costs of doing so. We show using data from a deployed access-control system that our methods can reduce the number of accesses that would have incurred costly time-of-access delays by 43%, and can correctly predict 58% of the intended policy. These gains are achieved without impacting the total amount of time users spend interacting with the system.
Funder
Air Force Research Laboratory
National Science Foundation
Office of Naval Research
Army Research Office
Publisher
Association for Computing Machinery (ACM)
Subject
Safety, Risk, Reliability and Quality,General Computer Science
Cited by
48 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SPRT: Automatically Adjusting SELinux Policy for Vulnerability Mitigation;Proceedings of the 29th ACM Symposium on Access Control Models and Technologies;2024-06-24
2. Effective Machine Learning-based Access Control Administration through Unlearning;2023 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW);2023-07
3. Troubleshooting Configuration Errors via Information Retrieval and Configuration Testing;2022 4th International Academic Exchange Conference on Science and Technology Innovation (IAECST);2022-12-09
4. A Survey on Empirical Security Analysis of Access-control Systems: A Real-world Perspective;ACM Computing Surveys;2022-12-07
5. Detecting and Measuring Misconfigured Manifests in Android Apps;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07